Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

signalarticles

Russian Researchers Develop New Telecommunications System

September 2002
By Robert K. Ackerman

A group of Russian telecommunications scientists has developed a new technology that can serve as a backbone for today's multiple communications protocols or as a stand-alone network. It can be scaled from a local area network up to a global telecommunications system capable of carrying voice, data and video simultaneously.

Sea Service Sets Missile Defense

September 2002
By Clarence A. Robinson Jr.

Buoyed by pinpoint impact and target destruction of successive ballistic missile test warheads in space, the U.S. Navy and the Missile Defense Agency are moving to more difficult engagement scenarios. This sea-based element of ballistic missile defense builds on the existing Aegis weapon control system and Standard Missile infrastructure to extend battlespace.

Air Force Communicators Move Faster Lighter

September 2002
By Robert K. Ackerman

Smaller proved to be better for U.S. Air Force special operations forces that were inserted into Afghanistan. The smaller aspect was in the reduced communications footprint that allowed small teams to quickly begin operations in remote hostile territory. The better element was the advanced communications and situational awareness capabilities that were established well before the entry of conventional forces.

Logistics Directorate Takes Wing

September 2002
By Henry S. Kenyon

A new U.S. Air Force organization will conduct base maintenance, logistics and communications systems operations as part of a broader restructuring of the service's capabilities. It will work closely with the commands to provide essential services such as electronic records management and databases, information assurance for military operations and force structure, and organizational issues analysis.

Aging the Fleet Gracefully

September 2002
By Sharon Berry

The U.S. Air Force's toughest opponent in its mission to maintain air supremacy may be the march of time. Its aircraft are flying more hours and serving well past their original service lifetimes, and new network-centric operations are impelling technology upgrade across all wings.

Virtual Token Leaves No Footprint

September 2002
By Henry S. Kenyon

A recently developed identification authentication system permits personnel to receive single-use passwords via wireless devices, allowing users who are traveling or at remote sites to access their networks. The technology is compatible with a variety of equipment that supports text messaging such as cellular telephones, pagers, personal digital assistants and laptop computers.

Let's Bite the Bullet and Pay For Information Security

Auust 2002
By Vice Adm. Herbert A. Browne, USN (Ret.)

The challenge of providing secure information is not new. Since the early days of computer networking, we have been striving to ensure the sanctity of bits and bytes. As computer and communications technologies advanced exponentially, so did the security challenges facing our information community. Now, information systems are everywhere and have become essential elements in the daily operations of industry, civil government, the intelligence community and military forces.

Government Enlists Industry for Information Security

August 2002
By Robert K. Ackerman

The United States has recruited private industry to help fight the war on terrorism on the home front. The next battlefield may be cyberspace, and the government is working with its operators to protect and defend crucial assets in that realm against attacks that could potentially cripple the country.

Keeping Malicious Code at Bay

August 2002
By Henry S. Kenyon

Research is extending the boundaries of information assurance technology to include the operational reliability of individual systems and the ability of tactical wireless networks to remain secure. Scientists are developing agile solutions to counter new types of cyberassaults and to protect vulnerabilities detected in emerging technologies.

Connections With Protections

August 2002
By Maryann Lawlor

Technology is now available that allows various organizations to share information from their databases without compromising their sources or individual agency policies. The software would enable national security and law enforcement groups to coordinate their efforts by facilitating the tracking of suspicious individuals and their activities.

Pages

Subscribe to signalarticles